LSM that blocks execution of the code from the anonymous pages

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hello!

Earlier in the therad "Should mprotect(..., PROT_EXEC) be checked by IMA?"
we've discussed whether IMA should intercept making executable of anonymous
pages.

I've implemented simple LSM that blocks execution of the code from anonymous
pages, like: mmap(RW) + read_unsigned_code_from_file() + mprotect(RX).

Currently it uses hooks similar to selinux_mmap_file() and
selinux_file_mprotect() to restrict any privileged processes (any uid is 0,
or any gid is 0 or any capability is set) from executing of anonymous unsigned
code.

The IMA module is specializing in file-backed (non-anonymous) code integrity
measurement while allowing execution of arbitrary anonymous code. In
conjunction with my LSM it would be possible to be sure that any code that is
executed on a device is trusted.

This would prevent malware payloads from being downloaded and executed in
both file-backed and anonymous memory. For example, there is even a framework
for making of filless malware:
https://www.prodefence.org/fireelf-fileless-linux-malware-framework/
Also there is an article about execution of ELFs from memory:
https://magisterquis.github.io/2018/03/31/in-memory-only-elf-execution.html
https://blog.fbkcs.ru/elf-in-memory-execution/

So it could be an independent LSM or extension of the LSM IMA functionality.

Also I'm thinking about extending working modes to:
1) no anonomous code for privileged processes (as currently),
2) no anonomous code for all processes,
3) no anonomous code for all processes with xattr-based exceptions (may be
   with xattr value signing)

I've found that some applications like browsers are using anonymous code
pages for JavaScript JIT code. Also some processes are using libffi that also
modifies to code. But it looks like it's possible to rebuild libffi with
trampoline support (PaX compatibility mode) to avoid altering the code pages.
Also QML-based application also use JS JIT. (And may be python scripts too.)

So for some (mostly unprivileged processes) we would need to make the
exceptions. But for most of the privileged system services (that is a good
target for attack because of their ptivileges) there is no need in code pages
modification, so the proposed functionality could be used to protect them,
as well as in embedded world where could be no user processes with JIT at all.

So IMA with this LSM would ensure that all the code that is executes is
trusted, signed and verified.

What do you think?

Thank you.



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux Kernel]     [Linux Kernel Hardening]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux SCSI]

  Powered by Linux